Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 00:42
Behavioral task
behavioral1
Sample
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe
Resource
win10v2004-20241007-en
General
-
Target
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe
-
Size
182KB
-
MD5
b6e743550abd61d79b63f36659154374
-
SHA1
1f15e7aed8535afb7769e72b9c081bc8721ca708
-
SHA256
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb
-
SHA512
0fdbe050ffe1f0848a16311c526283d3399d5ad0ce1c91a06bd4b86f9dddbd705d338cc24ac45fbd4173f255f38efe290dd1481e36c4401c101fc5a43df6893d
-
SSDEEP
3072:sr85CBkfpLoKpGoTX5o+gxtTecfQm24WbX5WvmRUq//tyH99g4byc6H5c6HcT66b:k9BkfpLoKMogS3mwUeRUq3tyH7xOc6Hi
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x0007000000019441-23.dat family_neshta behavioral1/files/0x000700000001944f-34.dat family_neshta behavioral1/files/0x001400000000f841-35.dat family_neshta behavioral1/files/0x0001000000010314-39.dat family_neshta behavioral1/files/0x0001000000010312-38.dat family_neshta behavioral1/files/0x0001000000010738-36.dat family_neshta behavioral1/memory/2544-55-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2716-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2424-69-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2892-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3024-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/796-84-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1736-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2344-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1648-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2848-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/536-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/564-132-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d8-128.dat family_neshta behavioral1/files/0x000100000000f776-135.dat family_neshta behavioral1/memory/1152-154-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1132-155-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1688-168-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2452-169-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/924-188-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/788-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/468-207-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2940-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1268-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2248-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1328-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2328-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2652-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1580-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2720-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2788-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2560-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1036-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2888-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1748-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2240-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2136-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2020-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1968-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1808-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1364-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/956-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2864-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/316-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/236-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2432-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1876-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1800-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2256-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3060-364-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2096-363-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2112-372-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1352-371-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1388-380-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1096-379-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/968-387-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2976-388-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1528-396-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2208-395-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2808 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2188 svchost.exe 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2544 svchost.com 2604 svchost.exe 2716 6FB6C6~1.EXE 2424 svchost.com 2892 6FB6C6~1.EXE 3024 svchost.com 796 6FB6C6~1.EXE 1736 svchost.com 2344 6FB6C6~1.EXE 1648 svchost.com 2848 6FB6C6~1.EXE 564 svchost.com 536 6FB6C6~1.EXE 1132 svchost.com 1152 6FB6C6~1.EXE 2452 svchost.com 1688 6FB6C6~1.EXE 788 svchost.com 924 6FB6C6~1.EXE 468 svchost.com 2940 6FB6C6~1.EXE 1268 svchost.com 2248 6FB6C6~1.EXE 1328 svchost.com 2328 6FB6C6~1.EXE 1580 svchost.com 2652 6FB6C6~1.EXE 2788 svchost.com 2720 6FB6C6~1.EXE 2560 svchost.com 1036 6FB6C6~1.EXE 1748 svchost.com 2888 6FB6C6~1.EXE 2240 svchost.com 2136 6FB6C6~1.EXE 2020 svchost.com 1968 6FB6C6~1.EXE 1364 svchost.com 1808 6FB6C6~1.EXE 956 svchost.com 2864 6FB6C6~1.EXE 236 svchost.com 316 6FB6C6~1.EXE 1876 svchost.com 2432 6FB6C6~1.EXE 1800 svchost.com 2256 6FB6C6~1.EXE 3060 svchost.com 2096 6FB6C6~1.EXE 2112 svchost.com 1352 6FB6C6~1.EXE 1388 svchost.com 1096 6FB6C6~1.EXE 968 svchost.com 2976 6FB6C6~1.EXE 1528 svchost.com 2208 6FB6C6~1.EXE 1816 svchost.com 824 6FB6C6~1.EXE 1612 svchost.com 2148 6FB6C6~1.EXE -
Loads dropped DLL 64 IoCs
pid Process 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2188 svchost.exe 2188 svchost.exe 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2544 svchost.com 2544 svchost.com 2716 6FB6C6~1.EXE 2424 svchost.com 2424 svchost.com 2892 6FB6C6~1.EXE 3024 svchost.com 3024 svchost.com 796 6FB6C6~1.EXE 1736 svchost.com 1736 svchost.com 2344 6FB6C6~1.EXE 1648 svchost.com 1648 svchost.com 2848 6FB6C6~1.EXE 564 svchost.com 564 svchost.com 536 6FB6C6~1.EXE 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 1132 svchost.com 1132 svchost.com 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 1152 6FB6C6~1.EXE 2452 svchost.com 2452 svchost.com 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 1688 6FB6C6~1.EXE 788 svchost.com 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 788 svchost.com 924 6FB6C6~1.EXE 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 468 svchost.com 468 svchost.com 2940 6FB6C6~1.EXE 1268 svchost.com 1268 svchost.com 2248 6FB6C6~1.EXE 1328 svchost.com 1328 svchost.com 2328 6FB6C6~1.EXE 1580 svchost.com 1580 svchost.com 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2652 6FB6C6~1.EXE 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 2788 svchost.com 2788 svchost.com 2720 6FB6C6~1.EXE 2560 svchost.com 2560 svchost.com 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 1036 6FB6C6~1.EXE 1748 svchost.com 1748 svchost.com 2888 6FB6C6~1.EXE 2240 svchost.com 2240 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2808 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 30 PID 2692 wrote to memory of 2808 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 30 PID 2692 wrote to memory of 2808 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 30 PID 2692 wrote to memory of 2808 2692 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 30 PID 2808 wrote to memory of 2188 2808 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 31 PID 2808 wrote to memory of 2188 2808 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 31 PID 2808 wrote to memory of 2188 2808 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 31 PID 2808 wrote to memory of 2188 2808 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 31 PID 2188 wrote to memory of 2728 2188 svchost.exe 32 PID 2188 wrote to memory of 2728 2188 svchost.exe 32 PID 2188 wrote to memory of 2728 2188 svchost.exe 32 PID 2188 wrote to memory of 2728 2188 svchost.exe 32 PID 2728 wrote to memory of 2544 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 33 PID 2728 wrote to memory of 2544 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 33 PID 2728 wrote to memory of 2544 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 33 PID 2728 wrote to memory of 2544 2728 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 33 PID 2544 wrote to memory of 2716 2544 svchost.com 35 PID 2544 wrote to memory of 2716 2544 svchost.com 35 PID 2544 wrote to memory of 2716 2544 svchost.com 35 PID 2544 wrote to memory of 2716 2544 svchost.com 35 PID 2716 wrote to memory of 2424 2716 6FB6C6~1.EXE 36 PID 2716 wrote to memory of 2424 2716 6FB6C6~1.EXE 36 PID 2716 wrote to memory of 2424 2716 6FB6C6~1.EXE 36 PID 2716 wrote to memory of 2424 2716 6FB6C6~1.EXE 36 PID 2424 wrote to memory of 2892 2424 svchost.com 37 PID 2424 wrote to memory of 2892 2424 svchost.com 37 PID 2424 wrote to memory of 2892 2424 svchost.com 37 PID 2424 wrote to memory of 2892 2424 svchost.com 37 PID 2892 wrote to memory of 3024 2892 6FB6C6~1.EXE 38 PID 2892 wrote to memory of 3024 2892 6FB6C6~1.EXE 38 PID 2892 wrote to memory of 3024 2892 6FB6C6~1.EXE 38 PID 2892 wrote to memory of 3024 2892 6FB6C6~1.EXE 38 PID 3024 wrote to memory of 796 3024 svchost.com 39 PID 3024 wrote to memory of 796 3024 svchost.com 39 PID 3024 wrote to memory of 796 3024 svchost.com 39 PID 3024 wrote to memory of 796 3024 svchost.com 39 PID 796 wrote to memory of 1736 796 6FB6C6~1.EXE 40 PID 796 wrote to memory of 1736 796 6FB6C6~1.EXE 40 PID 796 wrote to memory of 1736 796 6FB6C6~1.EXE 40 PID 796 wrote to memory of 1736 796 6FB6C6~1.EXE 40 PID 1736 wrote to memory of 2344 1736 svchost.com 41 PID 1736 wrote to memory of 2344 1736 svchost.com 41 PID 1736 wrote to memory of 2344 1736 svchost.com 41 PID 1736 wrote to memory of 2344 1736 svchost.com 41 PID 2344 wrote to memory of 1648 2344 6FB6C6~1.EXE 42 PID 2344 wrote to memory of 1648 2344 6FB6C6~1.EXE 42 PID 2344 wrote to memory of 1648 2344 6FB6C6~1.EXE 42 PID 2344 wrote to memory of 1648 2344 6FB6C6~1.EXE 42 PID 1648 wrote to memory of 2848 1648 svchost.com 43 PID 1648 wrote to memory of 2848 1648 svchost.com 43 PID 1648 wrote to memory of 2848 1648 svchost.com 43 PID 1648 wrote to memory of 2848 1648 svchost.com 43 PID 2848 wrote to memory of 564 2848 6FB6C6~1.EXE 44 PID 2848 wrote to memory of 564 2848 6FB6C6~1.EXE 44 PID 2848 wrote to memory of 564 2848 6FB6C6~1.EXE 44 PID 2848 wrote to memory of 564 2848 6FB6C6~1.EXE 44 PID 564 wrote to memory of 536 564 svchost.com 45 PID 564 wrote to memory of 536 564 svchost.com 45 PID 564 wrote to memory of 536 564 svchost.com 45 PID 564 wrote to memory of 536 564 svchost.com 45 PID 536 wrote to memory of 1132 536 6FB6C6~1.EXE 46 PID 536 wrote to memory of 1132 536 6FB6C6~1.EXE 46 PID 536 wrote to memory of 1132 536 6FB6C6~1.EXE 46 PID 536 wrote to memory of 1132 536 6FB6C6~1.EXE 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"C:\Users\Admin\AppData\Local\Temp\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE38⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE40⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"41⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"43⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE44⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE48⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"49⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"51⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"53⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE54⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"57⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE60⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"61⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"63⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"65⤵
- System Location Discovery: System Language Discovery
PID:904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE66⤵PID:2772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"67⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE68⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"69⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE70⤵
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"71⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE72⤵PID:2816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"73⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE74⤵
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"75⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE76⤵PID:2548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"77⤵
- Drops file in Windows directory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"79⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE80⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"81⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE82⤵PID:2052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE84⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"85⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE86⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"87⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE88⤵PID:632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"89⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE90⤵PID:560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"91⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE92⤵
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE94⤵
- Drops file in Windows directory
PID:2088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"95⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE96⤵PID:2192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"97⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE98⤵PID:2496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"99⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE100⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"101⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE102⤵PID:2512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"103⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE104⤵PID:2516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"105⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE106⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"107⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE108⤵PID:2640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"109⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE110⤵PID:1460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE112⤵
- Drops file in Windows directory
PID:2708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"113⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE114⤵PID:2712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE116⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE118⤵
- Drops file in Windows directory
PID:1296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"119⤵
- Drops file in Windows directory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE120⤵
- Drops file in Windows directory
PID:2584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"121⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE122⤵PID:1828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-